DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.
- Visit Live DorkTerm URL https://yogsec.github.io/DorkTerm/
- Terminal-inspired user interface with a green and black theme.
- Runs 15 predefined Google Dork queries for security reconnaissance.
- Built with Bootstrap for responsive design.
- User guidance on enabling popups for effective usage.
- Lightweight and easy to use.
- Enter a target domain in the input field (e.g.,
example.com
). - Click the "Run" button to initiate Google Dork queries.
- The tool opens multiple tabs, each performing a different Google Dork search.
- Analyze the results on Google for potential vulnerabilities.
The tool generates searches for common vulnerabilities, including:
site:example.com inurl:login
- Login pages.site:example.com inurl:admin
- Admin pages.site:example.com ext:php
- PHP files.site:example.com ext:sql
- SQL files.site:example.com ext:xml
- XML files.site:example.com ext:json
- JSON files.site:example.com "index of"
- Directory listings.site:example.com "password"
- Exposed passwords.site:example.com "error"
- Error messages.site:example.com intitle:"index of"
- Directory indexes.site:example.com inurl:wp-content
- WordPress content.site:example.com filetype:config
- Configuration files.site:example.com ext:bak
- Backup files.site:example.com ext:log
- Log files.site:example.com ext:env
- Environment files.## π Let's Connect!